-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] - Add S3 Repository for AWS missing role_arn option #209
Comments
Can you provide documentation for the |
sure See Step 2 and select Snapshots as it may default to encrypted snapshots |
Thanks, so we are talking about opensearch and not elasticsearch. I will add this to #191 |
It’s ElasticSearch too. If it is hosted on AWS, they renamed their service to “AWS OpenSearch Service” but it encompasses both (ElasticSearch Version up to 7.10) and (OpenSearch 1.x and 2.x). they changed their Service Offering Name, and started pushing opensearch because of Elastic changing their licensing model after 7.10. I have had to use Postman to add a repo with role_arn for all of my clusters even going back to version 1.5 |
I know the history of opensearch. But i am not able to find the option |
it is because it is a customization that AWS made to allow users to add a repo that uses S3 without making the S3 bucket Public. it has been there since version 1.5 on AWS Managed clusters only. The IAM role_arn is used to authenticate the cluster to have access to the S3 bucket Here is an example IAM Policy that would be attached to the role
and this is the trust policy that allows it to be used by elasticsearch
|
using a role allows you to bypass storing access key and secret in the keystore as it generates temporary credentials, when the role is used |
All I am asking for is an optional parameter for IAM Role Arn for AWS Managed clusters. is this something you would be willing to look into? Using a role is much more secure than an IAM User with an Access Key and Secret. I am more than happy to help test a build if it gets added. |
I will look into this. In the meantime, you can always use the |
Description
The UI does not allow adding an S3 Bucket Repository on AWS Managed Clusters because it is missing an option for settings.role_arn
The Following Error is presented:
{"Message":"settings.role_arn is needed for snapshot registration."}
Steps To Reproduce
List the steps to reproduce your problem:
Screenshots
Environment (please include the following information):
Additional Info
here is an example json body that gets sent to an AWS Elastic/OpenSearch Cluster to create a repo that uses S3
The text was updated successfully, but these errors were encountered: